Exam 9: Privacy, Security, and Ethics
Exam 1: Information Technology, the Internet, and You76 Questions
Exam 2: The Internet, the Web, and Electronic Commerce76 Questions
Exam 3: Application Software70 Questions
Exam 4: System Software74 Questions
Exam 5: The System Unit79 Questions
Exam 6: Input and Output79 Questions
Exam 7: Secondary Storage74 Questions
Exam 8: Communications and Networks75 Questions
Exam 9: Privacy, Security, and Ethics78 Questions
Exam 10: Information Systems75 Questions
Exam 11: Databases78 Questions
Exam 12: Systems Analysis and Design75 Questions
Exam 13: Programming and Languages75 Questions
Select questions type
A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _______.
(Short Answer)
4.8/5
(28)
_______-party cookies are used by advertising companies to keep track of your web activity as you move from one site to the next.
(Short Answer)
4.8/5
(39)
_______ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.
(Short Answer)
4.8/5
(38)
Which of the following is the most widely used wireless network encryption for home wireless networks?
(Multiple Choice)
4.9/5
(30)
_______ scanning devices use fingerprints and iris scanners to identify individuals.
(Short Answer)
4.9/5
(35)
Small data files that are deposited on a user's hard disk when they visit a website are called _______.
(Multiple Choice)
4.8/5
(41)
_______ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.
(Short Answer)
4.8/5
(30)
Which of the following is not a measure to protect computer security?
(Multiple Choice)
4.9/5
(38)
A tracking cookie is used by an advertising company to keep track of your web activity as you move from one site to the next.
(True/False)
4.8/5
(31)
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
(Multiple Choice)
4.8/5
(41)
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _______.
(Short Answer)
4.8/5
(41)
Which among the following is a way to shut down an ISP or website?
(Multiple Choice)
4.8/5
(39)
Spy removal programs are designed to detect and remove various types of privacy threats.
(True/False)
4.9/5
(42)
Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image.
(True/False)
4.9/5
(41)
Information systems consist of people, procedures, software, hardware, data, and the Internet.
(True/False)
4.9/5
(32)
_______ is the illegal assumption of someone's identity for the purposes of economic gain.
(Short Answer)
4.9/5
(36)
It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.
(True/False)
5.0/5
(38)
Biometric scanning devices are used to scan employee identification cards.
(True/False)
5.0/5
(33)
Showing 41 - 60 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)